Analysis
-
max time kernel
1559s -
max time network
1561s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 12:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20240729-en
3 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Payload.exe
Resource
win10v2004-20240802-en
2 signatures
1800 seconds
General
-
Target
Payload.exe
-
Size
98KB
-
MD5
3b92e3d6e7665d269767359f43da2b5e
-
SHA1
456e5e606b512f32460a98d838a59b7c71be7a97
-
SHA256
45be45b7affdf30b368cf5cb1d0c4eb0b6ba2e7542da6ae61319735420dfb4ef
-
SHA512
708d6f9ef9345f25b518741c5aebf9cb12ac1da385860ccec29ae56d1dcf3df658db26ec19d88c2498c5e90335e9001edf87ddc6c1d19af6b93327db73d0cd8a
-
SSDEEP
3072:mQo7bCNmMzzENy1+vQpeojuCUXlZxtNtjqV4:mQoSKG+vQph6RhtNtG
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2204 2088 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payload.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2204 2088 Payload.exe 31 PID 2088 wrote to memory of 2204 2088 Payload.exe 31 PID 2088 wrote to memory of 2204 2088 Payload.exe 31 PID 2088 wrote to memory of 2204 2088 Payload.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 482⤵
- Program crash
PID:2204
-